General

  • Target

    a7415c9345ab889e6c9c46b7db887adc_JaffaCakes118

  • Size

    2.7MB

  • Sample

    240614-agjsas1bjn

  • MD5

    a7415c9345ab889e6c9c46b7db887adc

  • SHA1

    7d3441fa949ce3a6a9d643e55b994e6828a190a0

  • SHA256

    d7eeb1dff083a728522560137d25bd36ce68571344212ceef8edf6cabb181e6b

  • SHA512

    8f1f940713b5acfab937376a4c699304cc377983a83659e1a14406b5d1def9d5761d9f4c02fed68e5d0a25e4a579073b5d08e328678d2b592a27d628a4b48336

  • SSDEEP

    12288:UZWtI6Rk4unuROB06GOKunuROB06GOKunuROB06GOKunuROB06fOKunuROB06GOR:UuhamOIOIOIO/OIOIOIOD

Malware Config

Targets

    • Target

      a7415c9345ab889e6c9c46b7db887adc_JaffaCakes118

    • Size

      2.7MB

    • MD5

      a7415c9345ab889e6c9c46b7db887adc

    • SHA1

      7d3441fa949ce3a6a9d643e55b994e6828a190a0

    • SHA256

      d7eeb1dff083a728522560137d25bd36ce68571344212ceef8edf6cabb181e6b

    • SHA512

      8f1f940713b5acfab937376a4c699304cc377983a83659e1a14406b5d1def9d5761d9f4c02fed68e5d0a25e4a579073b5d08e328678d2b592a27d628a4b48336

    • SSDEEP

      12288:UZWtI6Rk4unuROB06GOKunuROB06GOKunuROB06GOKunuROB06fOKunuROB06GOR:UuhamOIOIOIO/OIOIOIOD

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Sets file execution options in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks